-
Notifications
You must be signed in to change notification settings - Fork 109
Keypair Rotation
This document describes what secret credentials we maintain and how to rotate them.
We currently have two Ansible Vaults: production and sandbox, each with their own vault password.
You'll need both the existing key and the new key. Adjust the parameters for the new secret and run ansible rekey
in datagov-deploy
.
For production, you'll want to rekey all the vault files for production (i.e. filter out the sandbox vault files).
$ vault_id=production
$ vault_password_file=.secrets/production-v2.txt
$ find . -name vault.yml | grep -v sandbox | xargs pipenv run ansible-vault rekey --new-vault-id ${vault_id}@${vault_password_file}
To rekey the sandbox vault:
$ vault_id=sandbox
$ vault_password_file=.secrets/sandbox-v2.txt
$ find . -name vault.yml | grep sandbox | xargs pipenv run ansible-vault rekey --new-vault-id ${vault_id}@${vault_password_file}
Vault re-keys should be done as a hotfix to minimize the chance of merge conflicts within vaults and so all branches (master
and develop
) aren't using multiple key versions.
The root ssh keys allow access to the ubuntu
user. These keys are only used for the initial provision of the jumpbox. After that, operators use their personal keys to access all hosts.
-
Generate a new SSH key. When prompted, set a 16+ character password. For the comment, use the key name (datagov-environment-vX).
$ ssh-keygen -f ~/.ssh/datagov-environment-vX
-
Upload the private and public keys to the shared Drive. Share the password with teammates over a secure channel.
-
For BSP environments (production and staging), create a Service Now ticket to update the SSH key in the CloudFormation templates. Attach the public key to the ticket. BSP does not need the private key.
-
For AWS Sandbox environments, import the key in the AWS Console. Update the keypair name in datagov-infrastructure-live.